First CTF Organized by “Escuela de CTFs@UZ”

Context

On May 6, 2022, the Escuela de CTFs@UZ held its first CTF (Capture The Flag) event. This was a test for both the students and the organization itself, and the overall experience was out excellent!

This was a 3-hour hacking event in which participants had to solve technical challenges that required knowledge from various disciplines. The participants had to cooperate in teams of up to 2 members, although individual teams were also allowed. Both types of teams performed quite well!

Post-Event Notes (from the Organization)

The event was a success from our point of view. It was our first iteration of the event and we had a total of 10 teams and 16 participants. During the event itself we all enjoyed the experience of facing and solving problems (both the participants and the organization!). In addition, the activity was enlivened by various soundtracks to motivate the participants.

The Results

We prepared a series of entry-level, beginner-friendly challenges for our participants to solve.

During the competition, we published 19 challenges spread across various categories such as: Binary Exploitation, Web, Networking, Forensics, OSINT, Crypto, Steganography, and Misc.

Solve counts

Solve counts Ignore the fact that it says 26 challenges, we did not release all of them

Only two challenges were left unsolved at the end of the competition, one forensic challenge and one exploitation challenge.

The winning team was arrays should start at pi.
The second place was 404 Name Not Found

Top 10 teams graph Top 10 teams scoreboard

Prizes

The prizes for the 1st and 2nd team of this CTF were awarded on July 1, 2022, in an act where the participants explained a selection of the challenges they solved and the organization explained the two challenges that remained unsolved.

Media

We had some media coverage, appearing on the news of Aragón TV (local television network). You can see the video cut here.

Take-Home Message

From the organization we want to thank all the participants who have enjoyed as much as we did during the execution of this CTF. We look forward to the next one! Keep hacking!